Vulnerability in Citrix XenApp could result in arbitrary code execution

A vulnerability has been identified in the XML Service interface of XenApp that could potentially be used by a remote, unauthenticated attacker to execute arbitrary code in the context of a service account on a XenApp server. The vulnerability could potentially be exploited by sending a specially crafted packet to the vulnerable component.

This vulnerability affects Citrix XenApp versions 6.5 both with, and without, Feature Pack 1.

This vulnerability has been assigned the following CVE:

• CVE-2012-5161

Mitigating Factors

In order to exploit this issue, the attacker would need to be able to access the XML Service interface. In a normal deployment, the XML Service would not be directly exposed to the Internet.

What Customers Should Do

Hotfixes have been released to address this issue. Citrix strongly recommends that all customers install these hotfixes, which can be downloaded from the following locations:

Citrix XenApp 6.5 for Windows Server 2008 R2 with Feature Pack 1: CTX135025 – Hotfix XA650R01W2K8R2X64033 – For Citrix XenApp 6.5 for Windows Server 2008 R2 – English

Customers that are not able to upgrade to XenApp 6.5 with Feature Pack 1 may use the hotfix for the release version of XenApp 6.5 which is available at the following location: Citrix XenApp 6.5 for Windows Server 2008 R2: CTX135499 – Hotfix XA650W2K8R2X64036 – For Citrix XenApp 6.5 for Windows Server 2008 R2 – English

Read more about this vulnerability here.

Leave a Reply

Your email address will not be published.

This site uses Akismet to reduce spam. Learn how your comment data is processed.